- cryptographic loop-hole
- криптографическая слабость
English-Russian cryptological dictionary . 2014.
English-Russian cryptological dictionary . 2014.
криптографическая слабость — — [http://www.rfcmd.ru/glossword/1.8/index.php?a=index d=23] Тематики защита информации EN cryptographic loop hole … Справочник технического переводчика
SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms … Wikipedia
Inventions in medieval Islam — A significant number of inventions were developed in the medieval Islamic world, a geopolitical region that has at various times extended from Al Andalus and Africa in the west to the Indian subcontinent and Malay Archipelago in the east.… … Wikipedia
United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… … Universalium
iPhone — This article is about the line of smartphones by Apple. For other uses, see iPhone (disambiguation). The iPhone 4S, the most recent generation of the iPhone iPhone models … Wikipedia